summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py9
1 files changed, 8 insertions, 1 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
index 9053ec71ef..0a5bc0a870 100644
--- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
+++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
@@ -1,4 +1,4 @@
1# $OpenBSD: tlsfuzzer.py,v 1.22 2021/01/27 20:16:58 tb Exp $ 1# $OpenBSD: tlsfuzzer.py,v 1.23 2021/03/20 08:12:53 tb Exp $
2# 2#
3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org> 3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
4# 4#
@@ -243,6 +243,13 @@ tls13_failing_tests = TestGroup("failing TLSv1.3 tests", [
243 '-e', 'x448 - right-truncated key_share', 243 '-e', 'x448 - right-truncated key_share',
244 ]), 244 ]),
245 245
246 # The test sends records with protocol version 0x0300 instead of 0x0303
247 # and currently fails with OpenSSL and LibreSSL for theis reason.
248 # We have the logic corresponding to NSS's fix for CVE-2020-25648
249 # https://hg.mozilla.org/projects/nss/rev/57bbefa793232586d27cee83e74411171e128361
250 # so should not be affected by this issue.
251 Test("test-tls13-multiple-ccs-messages.py"),
252
246 # https://github.com/openssl/openssl/issues/8369 253 # https://github.com/openssl/openssl/issues/8369
247 Test("test-tls13-obsolete-curves.py"), 254 Test("test-tls13-obsolete-curves.py"),
248 255